Skip to content

Understanding Ransomware: Its Categories and Lived Scenarios

Comprehensive Overview of Ransomware: Discussing Various Types, Relevant Cases, and Historical Context on the Rise of Ransomware, with Additional Insights Now Available. Explore Further Here.

Ransomware: Its Definition, Classifications, and True-Life Scenarios
Ransomware: Its Definition, Classifications, and True-Life Scenarios

Understanding Ransomware: Its Categories and Lived Scenarios

Ransomware, a malicious type of software that encrypts data and files within an organization's IT environment or locks users out of their devices, has become a significant concern in the digital world. This article provides an overview of various ransomware variants, their methods, and the impact they have on organisations.

One of the most notorious ransomware variants is LockBit, which began attacks in September 2019 and operates an affiliate program known as Ransomware as a Service (RaaS). LockBit was updated to version 2.0 in June 2021 and was responsible for a data breach and ransomware infection at Accenture in August 2021.

In July 2021, the REvil ransomware group launched an attack on Kaseya, a Florida-based software provider of a widely used remote management monitoring solution. The attack impacted Kaseya, its customers, and companies who outsource IT management to Kaseya. Hackers demanded a staggering $70 million in payment.

Another infamous ransomware variant is Ryuk, which focuses on large organisations and demands over $1 million on average. It is one of the variants that took advantage of the switch to remote work during the COVID-19 pandemic.

Ransom demands in ransomware attacks can range from thousands to millions of dollars. Some ransomware variants encrypt the Master Boot Record (MBR), while others encrypt specific types of files. To maximise their chances of receiving a ransom payment, ransomware groups carefully research potential targets to determine how to infect them and the maximum ransom that they can demand.

Ransomware operators are increasingly supplementing their attacks with data theft or the threat of distributed denial of service (DDoS) attacks to increase their leverage and the probability of receiving a ransom payment. For instance, the Colonial Pipeline ransomware attack, believed to be the largest-ever attack on an American energy system, disrupted fuel supply across the East Coast for days until a $4.4 million ransom was paid.

The healthcare sector is particularly vulnerable to ransomware attacks, with potential deadly consequences. In Germany, between 2024 and 2025, about two to three severe ransomware attacks were reported daily, with small and medium-sized enterprises (SMEs) being particularly affected. The most affected sectors include non-profit organizations and education, which together accounted for over 20% of attack traffic.

Scareware, a form of ransomware designed to intimidate the target into taking some action, and screen locking ransomware, which locks the screen, keyboard, and mouse on a computer, making it impossible to use, are other forms of ransomware that pose a threat.

Ransomware groups often operate under an "affiliate" model where a ransomware developer distributes their malware to affiliates who infect victims' machines with it, and profits are shared between the ransomware developer and the affiliates.

In 2020, 33% of cyberattacks on government agencies were ransomware, disrupting missions and public services and creating a national security risk. Schools are also fast becoming a leading target for ransomware attacks.

In conclusion, ransomware attacks have become more widespread due to their profitability, ease of execution, and the availability of malware kits and cross-platform interpreters. It is crucial for organisations to implement robust cybersecurity measures to protect against these threats and minimise the impact of an attack.

Read also:

Latest